Setting up my own VPN because the logs scare me

Setting up my own VPN because the logs scare me

Upside

New member
Man I just lost a chunk on a campaign because my traffic got flagged. Again. And it's always some vague log policy from the VPN provider that they 'might' have. Smh. So I'm going self-hosted this time, no more trusting some company's word. Been trying to get OpenVPN running on a Raspberry Pi 4 for the past two days. The guides are all outdated or assume you're already a sysadmin. Like step one install openssl step two generate certs step three configure server.conf but nobody tells you about the dhparam file taking literally hours on the pi lol my fan is screaming. Then you gotta deal with port forwarding and your ISP might block stuff anyway. But honestly at this point even if it's slower, knowing there's zero logs sitting on someone else's server feels worth the headache. Ymmv obviously but after seeing how subpoenas actually work in some cases. yeah I'm building my own messy little box.
 
Honestly, just skipping VPN logs isn't enough, u gotta make sure ur traffic is also obfuscated. Using smth like Shadowsocks or even better, Tor for part of ur flow can make it even harder for someone to tie ur traffic back to u. Also, consider using a VPN with a kill switch and DNS leak protection to add another layer of security.
 
been doing this 3 years, and I disagree a bit. obfuscating traffic can help, but if ur VPN keeps logs or gets subpoenaed, all that is kinda moot. better to build a self-hosted solution or use
 
last month i set up my own wireguard on a cloud server, still worried about logs but at least i control it. do u think a no-logs policy is actually safe if the provider is compelled to hand over data?
 
Actually, port forwarding isn't always a big deal, especially if you use a VPN that supports NAT passthrough or a cloud VPS. Most ISPs aren't blocking VPN ports rn, so just pick one that
 
interesting point, especially since some court orders can force VPNs to cooperate even if they claim no logs. Ymmv, but I think the real peace of mind comes from controlling your own data path. Fwiw, I'd rather DIY than rely on a third party that might fold under pressure. Stay safe out there.
 
Actually, a lot of ISPs are blocking VPN ports or throttling VPN traffic secretly. Highkey better to just use obfuscation tools or stealth VPNs instead of relying on port guessing.
 
I get what you're saying but my experience with Raspberry Pi VPN setup was pretty smooth after I used PiVPN script instead of manual OpenVPN config. It handles certs and dhparam faster and more d. Did you try that?
 
Disagree, I think the real conf is how much time you waste figuring out all this stuff when there are tools like ZeroTier or wireguard. They just work, no fuss, no hours of waiting
 
Honestly, building your own VPN just to avoid logs is kinda like locking your front door and then leaving a note saying "trust me, nobody will come in" lol. If you're dead set on it, ditch OpenVPN on the Pi and try WireGuard, way simpler and way faster to set up. But yeah, even then, you're still just one subpoena away from the same headache, ymmv.
 
Yeah, I actually did. PiVPN made it way easier to get things rolling, especially with certs and dhparam. The script automates a lot of the manual steps, so you're not stuck staring at a fan for hours lol. Did you give it a shot or still rolling with the manual setup?
 
just my 2 cents, setting up your own VPN can seem like a good idea but it's not foolproof. logs or no logs, you need to know how secure your setup really is and if it's worth the hassle. kinda risky to think it's a 100% safe escape hatch
 
setting up your own vpn sounds good but honestly unless you know exactly what youre doing its just another layer of risk, not a fix.
 
u know setting up ur own vpn might just be giving u a false sense of security, not actual safety smh.
 
Back
Top